Documente Academic
Documente Profesional
Documente Cultură
Wireless?
• A wireless LAN or WLAN is a wireless local area
network that uses radio waves as its carrier.
Common Topologies
The wireless LAN connects to a wired LAN
1
2/25/20
Common Topologies
Complete Wireless Networks
• They let you stay connected as you roam from one coverage
area to another
2
2/25/20
3
2/25/20
Roaming
• Users maintain a continuous connection as they roam
from one physical area to another
• Mobile nodes automatically register with the new
access point.
• Methods: DHCP, Mobile IP
• IEEE 802.11 standard does not
address roaming, you may need
to purchase equipment from one
vendor if your users need to roam
from one access point to another.
Security
• In theory, spread spectrum radio signals are
inherently difficult to decipher without knowing
the exact hopping sequences or direct
sequence codes used
• The IEEE 802.11 standard specifies optional
security called "Wired Equivalent Privacy"
whose goal is that a wireless LAN offer privacy
equivalent to that offered by a wired LAN. The
standard also specifies optional authentication
measures.
Interoperability
• Before the IEEE 802.11 interoperability was based on
cooperation between vendors.
• IEEE 802.11 only standardizes the physical and
medium access control layers.
• Vendors must still work with each other to ensure
their IEEE 802.11 implementations interoperate
• Wireless Ethernet Compatibility Alliance (WECA)
introduces the Wi-Fi Certification to ensure cross-
vendor interoperability of 802.11b solutions
4
2/25/20
Hardware
• PC Card, either with integral antenna or with
external antenna/RF module.
• ISA Card with external antenna connected by
cable.
• Handheld terminals
• Access points
Hardware
Authentication
Means:
• Based on cryptography
• Non-cryptographic
• Both are identity-based verification mechanisms
(devices request access based on the SSID –
Service Set Identifier of the wireless network).
5
2/25/20
Authentication
• Authentication techniques
Privacy
• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data
sequence. The stream is XORed with the data
to be transmitted
• Key sizes: 40bits to 128bits
• Unfortunately, recent attacks have shown that
the WEP approach for privacy is vulnerable to
certain attack regardless of key size
Data Integrity
• Data integrity is ensured by a simple encrypted
version of CRC (Cyclic Redundant Check)
• Also vulnerable to some attacks
6
2/25/20
Security Problems
• Security features in Wireless products are frequently
not enabled.
• Use of static WEP keys (keys are in use for a very long
time). WEP does not provide key management.
• Cryptographic keys are short.
• No user authentication occurs – only devices are
authenticated. A stolen device can access the
network.
• Identity based systems are vulnerable.
• Packet integrity is poor.
Data rates
• Data rates affect range
• 802.11b 1 to 11 Mbps in 4 increments
• 802.11a 6 to 54 Mbps in 7 increments
• The minimum data rate must be determined at design
time
• Selecting only the highest data rate will require a
greater number of APs to cover a specific area
• Compromise between data rates and overall system
cost
7
2/25/20